nickvourd / random_c2_profileLinks
Cobalt Strike random C2 Profile generator
☆16Updated 2 months ago
Alternatives and similar repositories for random_c2_profile
Users that are interested in random_c2_profile are comparing it to the libraries listed below
Sorting:
- Standalone Cobalt Strike operation logging Aggressor script for Ghostwriter 2.0+☆35Updated last month
- Golang Implementation of Hell's gate☆21Updated 2 years ago
- Sniffing files generator☆59Updated 10 months ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆26Updated 3 years ago
- Aggressor script to automatically download and load an arsenal of open source and private Cobalt Strike tooling.☆45Updated last year
- These are the slide decks and source code for Brute Ratel Seminar conducted on 24th August 2023. The youtube video for the seminar can be…☆22Updated 2 years ago
- A BOF tool that can be used to collect passwords using CredUIPromptForWindowsCredentialsName.☆16Updated 3 years ago
- Docker container for running CobaltStrike 4.7 and above☆24Updated 9 months ago
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆34Updated 2 years ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆77Updated 2 years ago
- Your Skyfall Infrastructure Pack☆89Updated last month
- time-based user enum via Basic Auth in Azure against Autodiscover☆33Updated last year
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆40Updated 2 years ago
- Extract registry and NTDS secrets from local or remote disk images☆45Updated 9 months ago
- ☆26Updated 10 months ago
- maldev obviously☆28Updated 8 months ago
- Bunch of BOF files☆37Updated 6 months ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆85Updated 2 years ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆88Updated 3 years ago
- Python module for running BOFs☆79Updated last month
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆33Updated 3 years ago
- ☆22Updated 7 months ago
- ☆38Updated 10 months ago
- ☆40Updated last year
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 3 years ago
- Parses logs created by Cobalt Strike or Brute Ratel and creates an SQLite DB which can be used to create custom reports.☆15Updated 2 months ago
- SAM Dumping in C#☆54Updated last month
- Items related to the RedELK workshop given at security conferences☆29Updated 2 years ago
- Tool to aid in dumping LSASS process remotely☆42Updated 3 months ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆43Updated 9 months ago